STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to zOS BMC CONTROL-M for TSS Security Technical Implementation Guide

V-224577

CAT II (Medium)

BMC CONTROL-M configuration/parameter values must be specified properly.

Rule ID

SV-224577r1145941_rule

STIG

zOS BMC CONTROL-M for TSS Security Technical Implementation Guide

Version

V7R2

CCIs

CCI-000381

Discussion

BMC CONTROL-M configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.

Check Content

Refer to the following applicable report produced by the z/OS Data Collection:

- IOA.RPT(SECPARM).

Automated Analysis
Refer to the following report produced by the z/OS Data Collection:

- PDI(ZCTM0040).

If the following keywords specify the values in the BMC CONTROL-M security parameter member, this is not a finding.

Keyword	Value
DEFMCHKM	$$CTMEDM
SECTOLM	NO
DFMM01	EXTEND
DFMM02	EXTEND
DFMM08	EXTEND
TSSJCARD	U
MSUBCHK	NO

Fix Text

The BMC CONTROL-M systems programmer will verify that any configuration/parameters that are required to control the security of the product are properly configured and syntactically correct. Set the standard values for the BMC CONTROL-M security parameters for the specific ACP environment along with additional IOA security parameters with standard values as documented below.

Keyword	Value
DEFMCHKM	$$CTMEDM
SECTOLM	NO
DFMM01	EXTEND
DFMM02	EXTEND
DFMM08	EXTEND
TSSJCARD	U
MSUBCHK	NO